July 20, 2023, 1:10 a.m. | Richard Derbyshire, Benjamin Green, Charl van der Walt, David Hutchison

cs.CR updates on arXiv.org arxiv.org

For decades, operational technology (OT) has enjoyed the luxury of being
suitably inaccessible so as to experience directly targeted cyber attacks from
only the most advanced and well-resourced adversaries. However, security via
obscurity cannot last forever, and indeed a shift is happening whereby less
advanced adversaries are showing an appetite for targeting OT. With this shift
in adversary demographics, there will likely also be a shift in attack goals,
from clandestine process degradation and espionage to overt cyber extortion
(Cy-X). …

advanced adversaries attacks cyber cyber attacks cyber extortion dead experience extortion indeed operational operational technology plc security technology

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC